Technical Dotnet Lead
10+ Technical Dotnet Lead Interview Questions and Answers
Q1. how to implement exception handling and filters in .net core web api
Exception handling and filters in .NET Core Web API
Use try-catch blocks to handle exceptions in the code
Implement global exception handling middleware to catch unhandled exceptions
Use filters like [Authorize] for authentication and [ValidateAntiForgeryToken] for CSRF protection
Create custom exception filters by implementing IExceptionFilter interface
Q2. which Microservice communication pattern you have used?
I have used the asynchronous messaging pattern for Microservice communication.
Implemented messaging queues like RabbitMQ or Kafka for decoupled communication
Used message brokers to enable communication between Microservices
Leveraged event-driven architecture for real-time updates and scalability
Q3. Which single sign on technology/Mechanism is used in project
We are using OAuth 2.0 for single sign on in the project.
OAuth 2.0 is a widely used authorization framework that enables a third-party application to obtain limited access to an HTTP service.
It allows users to log in once and access multiple applications without having to log in again.
OAuth 2.0 provides secure delegated access to resources without sharing user credentials.
Q4. which Application Insight tool you have used?
I have used Application Insights for monitoring and analyzing the performance of .NET applications.
Used Application Insights to track application performance metrics
Analyzed telemetry data to identify performance bottlenecks
Set up alerts and notifications for critical issues
Integrated Application Insights with Azure DevOps for continuous monitoring
Q5. what is JWT token,why we use it
JWT token is a JSON Web Token used for secure transmission of information between parties.
JWT token is a compact and self-contained way to transmit information between parties.
It is digitally signed to verify its authenticity and integrity.
JWT tokens consist of three parts: header, payload, and signature.
They are commonly used for authentication and information exchange in web applications.
Example: JWT tokens are often used in OAuth 2.0 for secure authorization.
Q6. Caching Technique is used in your project
We use in-memory caching technique in our project to improve performance and reduce database load.
In-memory caching is used to store frequently accessed data in memory for quick retrieval
Helps reduce database load and improve application performance
Examples: using MemoryCache in .NET, Redis caching, caching frequently accessed data like user profiles or product information
Share interview questions and help millions of jobseekers 🌟
Q7. What is yield , enum & absctract class
Yield is used in C# to return a sequence of values, enum is a type that represents a set of named constants, and abstract class is a class that cannot be instantiated and must be inherited.
Yield is used in C# to return a sequence of values one at a time without blocking the caller.
Enum in C# is a value type that defines a set of named constants. For example, enum Days { Monday, Tuesday, Wednesday }.
Abstract class in C# is a class that cannot be instantiated and must be inheri...read more
Q8. Api Gateways is used in MicrosServices
Yes, API Gateways are used in Microservices to manage and secure communication between services.
API Gateways act as a single entry point for clients to access multiple microservices
They handle authentication, authorization, rate limiting, logging, and monitoring
Examples of API Gateways include Kong, Apigee, and AWS API Gateway
Technical Dotnet Lead Jobs
0Q9. Authenitcation using application
Authentication using application involves verifying the identity of users before granting access to resources.
Use authentication mechanisms like username/password, tokens, or biometrics.
Implement secure protocols like OAuth or OpenID Connect.
Utilize multi-factor authentication for added security.
Regularly update authentication methods to stay ahead of security threats.
Q10. What is delegates
Delegates are type-safe function pointers in C# that allow methods to be passed as parameters.
Delegates are similar to function pointers in C/C++.
Delegates can be used to define callback methods.
Delegates can be used to implement events in C#.
Delegates are type-safe and secure.
Example: delegate void MyDelegate(string message);
Q11. What is oops concept
OOPs is a programming paradigm based on the concept of objects, which can contain data and code.
OOPs stands for Object-Oriented Programming.
It focuses on creating objects that interact with each other to solve a problem.
Encapsulation, Inheritance, Polymorphism, and Abstraction are the four main pillars of OOPs.
Example: A car can be considered as an object that has properties like color, model, and features, and methods like start, stop, and accelerate.
OOPs makes code reusable...read more
Q12. Solid principals in detail
SOLID principles are a set of five design principles for writing maintainable and scalable code.
Single Responsibility Principle (SRP) - a class should have only one reason to change
Open/Closed Principle (OCP) - software entities should be open for extension but closed for modification
Liskov Substitution Principle (LSP) - objects of a superclass should be able to be replaced with objects of a subclass without breaking the program
Interface Segregation Principle (ISP) - clients ...read more
Interview Questions of Similar Designations
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month